Journal of Northeastern University Natural Science ›› 2019, Vol. 40 ›› Issue (3): 327-333.DOI: 10.12068/j.issn.1005-3026.2019.03.005

• Information & Control • Previous Articles     Next Articles

Integrity Assurance of Outsourced Spatial Database

HONG Jun1,2, WEN Tao1, YE Zheng-wang1, KANG Jun2   

  1. 1. School of Computer Science & Engineering, Northeastern University, Shenyang 110169, China; 2. School of Software, North University of China, Taiyuan 030051, China.
  • Received:2018-01-08 Revised:2018-01-08 Online:2019-03-15 Published:2019-03-08
  • Contact: HONG Jun
  • About author:-
  • Supported by:
    -

Abstract: User′s data stored on a cloud computing service provider may be tampered or deleted. The query integrity verification scheme enables a query user to verify that the data in the query results is authentic and all the data that meet the criteria are in the query results. As an improvement of the existing authenticated tree schemes, a space authenticated data structure, called verifiable SS-tree(VSS-tree), is proposed to support spatial query and query authentication. The VSS-tree extends each node of SS-tree with authentication information. Boundary sphere is used for region shape which increases the degree of node and thus reduces the height of authenticated tree. Furthermore, it can avoid unnecessary disk access, which improves the processing efficiency of spatial query verification. Experimental results showed that VSS-tree can efficiently support spatial query and has better performance than MR-tree.

Key words: data outsourcing, k-nearest neighbor, spatial database, cloud computing, query authentication

CLC Number: